But with AppGuard, you can patch at your own pace. Patch management is a growing problem for IT/Sec-Ops teams. A Ponemon survey report [PDF] describes the scale of the patch management challenge. Surveyed cybersecurity professionals reported that attack volumes were up 15 percent and attack severity had increased 24 percent. But in 57 percent of […]
Read More ›So, the 2019 RSA Conference, which wrapped up on March 8, was an event to remember. As we predicted in a post before the event, many new entrants to the growing cybersecurity field participated this year, and we were excited to learn more about what partners and competitors are offering. The exhibition hall had more […]
Read More ›This year’s RSA Conference in the U.S. takes place March 4 to 8 in San Francisco. The event will bring thousands of cybersecurity professionals together to talk security and share new ideas. So, which security-related issues will be top of mind at this year’s conference? Here are three items that you’re sure to hear about […]
Read More ›It’s important to protect all of your devices, but with servers, the stakes can be stratospheric. Hackers who compromise a server can potentially harvest data for years and gain access to devices, processes, and information throughout an organization — a nightmare scenario. A panel of experts discussed the threat to servers in a recent webinar […]
Read More ›Last month, the longest government shutdown in U.S. history finally came to an end. The five-week partial shutdown, caused by a standoff between Congress and the president over border wall funding, cost the U.S. economy $11 billion, according to an estimate from the nonpartisan Congressional Budget Office. The CBO projects that all but $3 billion […]
Read More ›Like antibiotic-resistant strains of bacteria give nightmares to medical epidemiologists, modular malware systems are doing the same to cyber defenders. New variations of modular malware are appearing weekly, if not daily. They are designed to target Linux and Windows Servers. Xbash, AdvisorsBot, and Marap are a few examples of a modular malware that doubled in […]
Read More ›If you want better and easier server protection than what you have now or have read about elsewhere, then you need something very different. You’ve come to the right place for a brief introduction to the application of zero-trust principles WITHIN the endpoint. If you’re not receptive to change and different paradigms, read no further. […]
Read More ›Panelists worthy of any CISO’s attention, discussed and prioritized the methods China is using to compromise enterprises via their supply chain, including the currently rare, covert placement of spy chips into computing hardware. China’s ‘2025’ strategy to steal and degrade western economic power affects any enterprise that generates high-margin value and/or is in the same […]
Read More ›Reports of covertly adding chips to motherboards for industrial espionage require CISO’s to ask their peers and teams ‘what are the Chinese actually doing to steal data from organizations like ours’ and ‘what should we be doing to counter their efforts’? Enterprises targeted by China can get the answers and insights they seek from the […]
Read More ›5 Critical Areas All CISOs Should be Focused On – CISO Web Panel: 3 October 2018 Panelists Donald J. Welch, Penn State, CISO Anthony Cruz, Federal Energy Regulatory Commission, Cyber Thought Leader Moderator: Neal Conlon, AppGuard Inc, VP Business Development The CISO panel explored the challenges of 2018 and what remedies and priorities they consider […]
Read More ›